Search Results for Security systems. - Narrowed by: 2010SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bsystems.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-11-11T23:30:51ZInformation Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1919732024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Samarati, Pierangela. editor. Tunstall, Michael. editor. Posegga, Joachim. editor. Markantonakis, Konstantinos. editor. Sauveron, Damien. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-12368-9">http://dx.doi.org/10.1007/978-3-642-12368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)ent://SD_ILS/0/SD_ILS:1933592024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Herrero, Álvaro. editor. Corchado, Emilio. editor. Redondo, Carlos. editor. Alonso, Ángel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16626-6">http://dx.doi.org/10.1007/978-3-642-16626-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:1936202024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Schmidt, Andreas U. editor. Russello, Giovanni. editor. Lioy, Antonio. editor. Prasad, Neeli R. editor. Lian, Shiguo. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Water productivity in rainfed agriculture redrawing the rainbow of water to achieve food security in rainfed smallholder systemsent://SD_ILS/0/SD_ILS:2900552024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Makurira, Hodson.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203093429">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papersent://SD_ILS/0/SD_ILS:1917122024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stabilization, Safety, and Security of Distributed Systems 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1931602024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Dolev, Shlomi. editor. Cobb, Jorge. editor. Fischer, Michael. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-16023-3">http://dx.doi.org/10.1007/978-3-642-16023-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:1467152024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managed code rootkits hooking into runtime environmentsent://SD_ILS/0/SD_ILS:1478362024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Metula, Erez.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A guide to kernel exploitation attacking the coreent://SD_ILS/0/SD_ILS:1480592024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Perla, Enrico. Massimiliano, Oldani.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:1490332024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The handbook of technology managementent://SD_ILS/0/SD_ILS:1345172024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Bidgoli, Hossein.<br/>Preferred Shelf Number HD45 .H294 2010 V.1<br/>Format: Books<br/>Availability Beytepe Library~3<br/>Metrics and methods for security risk managementent://SD_ILS/0/SD_ILS:1463062024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Young, Carl S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856179782">http://www.sciencedirect.com/science/book/9781856179782</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security of mobile communicationsent://SD_ILS/0/SD_ILS:2866052024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Boudriga, Noureddine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Risk analysis and security countermeasure selectionent://SD_ILS/0/SD_ILS:2887852024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:3063302024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Science and technology of terrorism and counterterrorisment://SD_ILS/0/SD_ILS:2862792024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Ghosh, Tushar K., Dr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439875612">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Food security and soil qualityent://SD_ILS/0/SD_ILS:2869442024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Lal, R. Stewart, B. A. (Bobby Alton), 1932-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439800584">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security, risk and the biometric state governing borders and bodiesent://SD_ILS/0/SD_ILS:2666902024-11-11T23:30:51Z2024-11-11T23:30:51ZAuthor Müller, Benjamin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203858042">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>